How Identity and Access Intelligence (IAI) Can Help With Your Next Audit

Are access control audits time consuming and tedious? Are auditors finding excessive access rights and other compliance issues? Learn about a new approach Gartner calls "Identity and Access Intelligence" (IAI).

Join Alan Norquist, CEO of Veriphy, as he introduces IAI and demonstrates how this approach improves the outcome of access control audits, as well as reduces the time and effort needed for audit preparation.

Topics covered will include:

- What Identity and Access Intelligence (IAI) is and what problems it solves.
- How IAI relates to Identity and Access Management (IAM/IdAM).
- How IAI can be used to enable fast accurate compliance of user access activity as well as roles and rights.
- How IAI big data analytics can census all user rights and activity in less time than needed to manually test a sample.

The enterprise cybersecurity landscape is dramatically expanding in scale and complexity, and cyberattacks are growing in magnitude and impact as digital transformation increases on a global scale. From phishing scams, to ransomware attacks, to malicious breaches from state actors, the potential threat to your business is huge. According to the Ponemon Institute, the average per breach cost to a company in 2018 was estimated at $3.86 million, an increase of 6.4 percent over the previous year.

Even though cybersecurity presents a challenge to the enterprise, you are not helpless against the bad actors who seek to cause real and costly damage to your business. A proactive, company-wide, integrated digital security strategy that addresses cybersecurity threats at all levels of your business will provide you with both the offensive and defensive capabilities you need to handle whatever comes your way. Earn 1 CPE credit by attending this educational and interactive panel webinar. Our experts will discuss why fortifying your cybersecurity strategy should be a critical priority and highlight some best practices that you can employ to stay ahead of evolving threats, including how to;

The California Consumer Privacy Act of 2018 (CCPA) is arguably the most expansive privacy law in U.S. history and will become enforceable in just a matter of months. The CCPA introduces new privacy rights for consumers and will force companies that conduct business in the State of California to implement structural changes to their privacy programs.

The new rights given to California consumers are similar to the rights provided in the European Union’s General Data Protection Regulation (GDPR). The CCPA also subjects non-compliant businesses to expensive fines, class-action lawsuits, and injunctions.

On this webinar, we will examine the impact of the CCPA, answer your burning questions, uncover the CCPA’s nuances, and address its ambiguities and challenges. We will also include strategies for creating compliance programs in the midst of the unknowns, and a strategic action plan for businesses to become compliant.

High-Profile Data Breaches have placed a spotlight on the risk of cyber security breaches with vendors and subcontractors, expanding the need to have greater rigor in third party risk management and ongoing risk assessments. Maintaining an effective third-party risk management program doesn't happen overnight. It's a journey that involves continual learning, refinement and evolution.

And as a program matures over time, it results in the management of vendors and other third parties with fewer risks, lower costs, better performance and stronger compliance. Since every company is at a different place in their journey towards better vendor management, it's important to identify steps that you can follow as you mature your program, and to consider your vendor risk ecosystem and the data and services that can have an enormous impact on risk reduction. On this CPE accredited webinar our panel of experts will address some key steps to mature your third-party risk management program, including how to:

In today’s multi-cloud and hybrid environments, CISO's are struggling to secure assets, manage security policies across clouds, monitor and mitigate risks, while also supporting the business. How are CISOs solving the challenge of complexity?

Join this panel of experts to learn how to simplify cyber risk management as well as maximize the value of your team and technology.
- Risk scoring and security controls
- How to identify risks for organizations and their third-party vendors
- How to prevent, detect, and respond to, privacy and network security incidents
- Best of vulnerability and risk management in a multi-vendor environment
- Best practices and use cases across industries

The California Consumer Privacy Act goes into effect January 1, 2020. If you are a for-profit company operating in the state of California, you need to have the right processes in place to support CCPA privacy requirements – or face stiff penalties. Are you ready?

Attend this CPE accredited webinar to understand what is required by the CCPA, what you need to do now to prepare, how it relates to the rest of your compliance program, and what other privacy laws are on the horizon.

You’ll learn:

- What types of companies are affected by CCPA
- How CCPA compares to GDPR
- How technology can help you comply with privacy laws

With identity theft and account takeover on the rise, it’s increasingly difficult for businesses to trust that someone is who they claim to be online.

Join this exclusive interactive 1-2-1 interview where Robert Prigge, President, Jumio will share the latest identity verification and authentication trends and how you can leverage the power of biometrics, AI and the latest technologies to quickly verify the digital identities of new customers and existing users. Some questions to be tackled;

What types of cybersecurity threats are on the rise? Any surprising stats?

Is account takeover becoming a real threat in the financial services space?

How will eKYC evolve over the next few years?

How to balance the trade-off between customer experience and fraud detection?

Are the new breed of challenger banks a threat to high street banks? If so why?

Register today and do not miss out on the opportunity to have your questions answered in this interactive question and answer session.

This session will give you insights into the digital identity, authentication and verification landscape. You will also learn how you can increase the return on investment in your digital transformation by reducing online application abandonment rates and improving conversion rates.

Cyber-attacks have cost the financial services industry more than any other sector, especially due to the extremely sensitive data and assets that they are gatekeeping.

Join this panel to learn:
-What is the current state of the cybersecurity in financial services?
-Why is cybersecurity more of a business risk than a technology issue?
-Best practices for detecting and preventing threats

Machine learning systems are now routinely performing complex tasks at unparalleled levels of performance across a wide range of applications. However, mission-critical applications such as those in financial services have a minimum tolerance for errors and error correction. Resultantly, the design of machine learning-based systems for such applications requires unprecedented levels of oversight and adaptability.

An optimal system has the right level of interplay between humans and machines. Onfido employs a large number of machine learning models to deliver scalable, secure and frictionless identity verification for their clients, whilst giving clients accurate data they need to remain KYC compliant—so ensuring their models deliver real-world results is business-critical. In this interview we talk with Mohan Mahadevan, VP of Research at Onfido, to learn about how the constraints on these applications, the tradeoffs in an optimal system, and what the future looks like.

Mohan is an expert in computer vision, machine learning, AI, data and model interpretability, previously leading research efforts at Amazon as Head of Computer Vision and Machine Learning for Robotic Applications. He has over 15 patents in areas spanning optical architectures, algorithms, system design, automation, robotics and packaging technologies. As Onfido’s VP of Research he leads Onfido’s team of specialist machine learning engineers and is focused on ensuring their systems work both in the lab and the real world.

The California Consumer Privacy Act (CCPA) is going into effect on January 1, 2020, making it America’s first-ever state data privacy law. It is also the most far-reaching privacy regulation in the U.S. to date.

Join this panel of experts for an interactive Q&A session to learn more about what businesses need to do to prepare for CCPA. Attendees will also learn about the CCPA checklist, as well as dive into:
- GDPR vs. CCPA
- Which organizations need to plan for CCPA compliance
- What to do to avoid the risk of fines
- How to develop a strategy and start implementing tools to achieve compliance
- More privacy legislation on the horizon

Consumer demand is driving the corporate IT environment. Business demands for IT are changing rapidly — so too are the demands on IAM — resulting in the requirement to adopt emerging technologies (e.g., mobile and cloud computing, data loss prevention, and social media) earlier and more quickly. Scalability is critical for any business that wants to catalyze short- and long-term success. A flexible workflow for identity verification can help organizations of all sizes with limited time, resources, and funding to focus their efforts on initiatives that support positive growth. While your business might be conducting background checks today, it could have different verification needs in the future to ease onboarding friction, prevent data breaches, and demonstrate regulatory compliance.

It’s important to begin laying the groundwork now for a more sophisticated and intricate verification program so you can be proactive, not reactive, but what does a scalability strategy look like? In this CPE accredited panel webinar our experts will address how to create identity and credential verification workflows that can scale with your organization as it grows, including how to:

- Gain a better understanding of the digital identity landscape,
- Ensure accuracy of both data sources and verification records,
- Centralize verification of multiple data sources into a unified platform,
- Evaluate new developments like biometrics, AI, and blockchain, and how they can impact identity and data management,
- Save money in the long-term by laying the groundwork for adaptable online verification workflows,
- Adapt and respond to new regulations.

Join us for this webinar that will demonstrate how your organization can adopt best practices for vulnerability management, threat intelligence and cyber risk management that previously had been beyond your means. For various reasons - tight budgets, lack of skills or resources, or a focus on other priorities - most companies perform vulnerability, threat and risk management in a very tactical way. Join Troy Vennon, Director of Security Innovation at the Columbus Collaboratory, for this session outlining how the combination of cloud-based vulnerability management, threat analysis and risk assessment, bundled with expert reporting and guidance for your specific IT environment, will cost-effectively transform your security operations from the tactical to the strategic.

Join us for this webinar presenting the benefits of networking with your industry peers to share intelligence about threats and vulnerabilities. In today's environment where the threats seem to intensify, it's critical to know who to trust. During this session, Troy Vennon, Director of Security Innovation at the Columbus Collaboratory, will outline the benefits of an Information Sharing and Analysis Organization (ISAO), explain how you can benefit from joining an ISAO even if you're already part of an ISAC, and provide an example of how collaboration around cyber threat data can enable your organization to efficiently identify and neutralize the most prolific and potentially harmful threats out there.

With hundreds of different requirements, the various Payment Card Industry (PCI) standards can be overwhelming. While the PCI Security Standards Council has provided lots of answers, the devil is often in the details.

Our panelists are some of the top PCI QSA’s in the country, with decades of combined PCI and card processing experiences. They’ve seen it all: the good, bad and ugly; and lived to tell the tale.

Join Ben Rothke, David Mundhenk, Arthur Cooper, and Jeff Hall for an interactive Q&A session, and get answers to your most vexing PCI questions. No PCI question is out of bounds.

Organizations are evolving beyond the traditional, reactive approach to privacy and data security to thinking proactively. Are we closer to a Privacy-and-Security-by-Design reality?

Join this panel of experts to get the answer to all of your privacy, security and compliance questions. Viewers can learn more about:
- Effects of GDPR: One year later
- How businesses are preparing for CCPA
- Best practices for achieving and maintaining compliance
- How to bake privacy and security into your processes
- What to expect in the next 12 months

The current state of vendor risk management (VRM) is bleak. More than half of all information security breaches are caused by third-party vendors, and according to Deloitte 83% of today’s business leaders lack confidence in third party VRM processes. Given the growing complexities in accurately collecting and screening third-party data and the need for deeper due diligence, automation is key to a successful risk program. However, many corporations haven’t adopted automation in their third-party risk management programs.

The lack of automation adoption can be traced to a few core reasons. Disparate systems, out-of-date data, and inconsistent policies can all stifle a company’s ability to modernize their third-party risk management program, and companies often suffer from more than one of these. When applied effectively, automation can not only help prevent these roadblocks; it can also drive the efficiencies procurement and compliance leaders are looking for. Join this CPE accredited panel webinar as our expert panel address some key steps to automating third-party risk management, including how to:

-Manage an up-to-date vendor master to create one source of truth across the entire corporation,
-Leverage automation and machine learning to standardize data governance,
-Drive efficiencies and reduces costs, while ensuring the highest accuracy in your third-party risk management program.

Personal data privacy will be the most prominent issue affecting how businesses gather, store, process, and disclose data in public cloud. Businesses have been inundated with information on what recent privacy laws like GDPR and CCPA require, but many are still trying to figure out how to comply with them on a practical level. Many companies are focusing on data privacy from the legal and security side, which are foundational, but are missing the focus on data.

The good news is that these data privacy regulations compel businesses to get a handle on personal data — how they get it, where they get it from, which systems process it, where it goes internally and externally, etc. In other words, the new norms of data privacy require proactive data management, which enables organizations to extract real business value from their data, improve the customer experience, streamline internal processes, and better understand their customers.

Join this interactive webinar to learn more about:
- The latest trends and strategies for securing sensitive data in cloud and the enterprise
- How to discover and capture your data inventory
- What’s needed to prevent a data breach by securing your critical data and protect your reputation

Today’s increasing organizational complexity and evolving threat environment have made it more critical than ever for organizations to clearly identify their exposures, measure vulnerability risk, and quickly prioritize remediation efforts. Cyberattacks are often hidden from view under a mountain of alerts generated by security systems, giving attackers time to gain access to systems and seize valuable data.

To ensure their companies don't end up in the headlines for the wrong reasons, corporate governance, risk management, compliance management and other “lines of defense” functions need to rethink their security strategy and take an approach that looks at behavior and attack patterns. By conecting cybersecurity attack analytics with risk programs and GRC work streams, executives can increase visibility into the overall security risk of the organization which makes the investigation of application security events easy, and enables teams to mitigate and respond to real security threats quickly and decisively.

Join this CPE panel webinar for insights on achieving smarter GRC with CAA. We will share:

- Why traditional endpoint security is failing to see and stop attacks.
- How using attack analytics can stop cyberattacks now and in the future.
- Efficient ways to analyze events and prevent threats.
- How to move from looking back to real-time and forward-looking GRC monitoring.

Increasing expectations for good data governance, effective risk management and complex demands for legislative and regulatory compliance are presenting a growing challenge for organizations of all sizes. Tune in to live and recorded presentations by respected luminaries in the fields of governance, risk and compliance for insights on how to implement successful GRC strategies and processes for your organization.